An end-to-end approach to secure routing in MANETs

被引:2
|
作者
Dabideen, Stephen [1 ]
Smith, Bradley R. [1 ]
Garcia-Luna-Aceves, J. J. [1 ,2 ]
机构
[1] Univ Calif Santa Cruz, Dept Comp Engn, Santa Cruz, CA 95064 USA
[2] Palo Alto Res Ctr, Palo Alto, CA 94304 USA
关键词
security; ad-hoc networks; end-to-end;
D O I
10.1002/sec.121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing secure routing in mobile ad hoc networks (MANETs) is far more difficult than establishing secure routing in wired networks or static wireless networks. Node mobility and the relative scarcity of bandwidth render prior solutions ineffective. Solutions based on securing link or path information do not work well in MANETs because the dynamic nature of links requires extensive use of flooding to establish effective countermeasures. On the other hand, solutions based on hop-by-hop exchanges of distance information are easily compromised. Instead of trying to secure the ordering of nodes, we argue that secure routing in MANETs must be based on the end-to-end verification of physical-path characteristics aided by the exploitation of path diversity to increase the probability of finding secure paths. We apply this approach to the design of the Secure Routing through Diversity and Verification (SRDV) protocol, a secure routing protocol that we show to be as efficient as unsecured on-demand or proactive routing approaches in the absence of attacks. We prove that the countermeasures used in SRDV can defend against a variety of known attacks to routing protocols, including attacks involving collusion, and the fabrication and modification of routing packets. We also show the effectiveness of the end-to-end mechanisms via simulations. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:130 / 149
页数:20
相关论文
共 50 条
  • [21] SECURE END-TO-END DELEGATIONS IN DISTRIBUTED SYSTEMS
    HARDJONO, T
    OHTA, T
    COMPUTER COMMUNICATIONS, 1994, 17 (03) : 230 - 238
  • [22] Secure End-to-End Sensing in Supply Chains
    Pennekamp, Jan
    Alder, Fritz
    Matzutt, Roman
    Muehlberg, Jan Tobias
    Piessens, Frank
    Wehrle, Klaus
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [23] Study on Comparative Analysis of End-to-End Routing and Opportunistic Routing
    Minamiguchi, Chuta
    Kawabata, Natsuko
    Nakamura, Ryo
    Ohsaki, Hiroyuki
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, : 955 - 958
  • [24] End-to-end delay satisfaction balancing routing
    Ashour, M
    Le-Ngoc, T
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 852 - 856
  • [25] Routing in quantum networks with end-to-end knowledge
    Kumar, Vinay
    Cicconetti, Claudio
    Conti, Marco
    Passarella, Andrea
    IET QUANTUM COMMUNICATION, 2025, 6 (01):
  • [26] On routing algorithms with end-to-end delay guarantees
    Rao, NSV
    Batsell, SG
    7TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS - PROCEEDINGS, 1998, : 162 - 167
  • [27] Impact of overlay routing on end-to-end delay
    Zhang, Hui
    Tang, Li
    Li, Jun
    ICCCN 2006: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2006, : 435 - +
  • [28] End-to-End Delay in Localized QoS Routing
    Alzahrani, Ahmed S.
    Woodward, Michael E.
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1698 - 1704
  • [29] On Delivery Delay-Constrained Throughput and End-to-end Delay in MANETs
    Fang, Yujian
    Zhou, Yuezhi
    Jiang, Xiaohong
    Zhang, Yaoxue
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 456 - 463
  • [30] A Protocol for End-to-End Key Establishment during Route Discovery in MANETs
    Talawar, Shrikant H.
    Hansdah, R. C.
    2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015), 2015, : 176 - 184